NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

31 32 33
hits: 329
321.
  • Standard to put a dollar va... Standard to put a dollar value on info. (Information Systems Security Association's standard for determining the monetary value of computer information)
    Crockett, Barton Network world, 04/1989, Volume: 6, Issue: 13
    Magazine Article

    The Information Systems Security Association (ISSA) plans to establish a standard procedure for determining the monetary value of computer information. The ISSA group in charge of developing the ...
Full text
322.
  • Integrating Automated Information Security and Information Resources Management
    Chick, Morey J Information Management Review, 1990, Volume: 5, Issue: 3
    Journal Article

    Argues that the security of automated information systems must be made a management priority and effectively supported. The steps needed to achieve this objective are outlined in the areas of ...
Check availability
323.
Full text

PDF
324.
  • On the Security of Route Di... On the Security of Route Discovery in MANETs
    Burmester, M.; de Medeiros, B. IEEE transactions on mobile computing, 09/2009, Volume: 8, Issue: 9
    Magazine Article
    Peer reviewed
    Open access

    Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources, and no fixed infrastructure. Communication is achieved by relaying data along ...
Full text

PDF
325.
  • Educating the Systems Secur... Educating the Systems Security Engineer's Apprentice
    Irvine, Cynthia; Nguyen, Thuy D. IEEE security & privacy, 2010-July-Aug., 2010-07-00, 20100701, Volume: 8, Issue: 4
    Magazine Article

    The paper discussed how to educate and explore a way to educate different apprentice in security aspect.
Full text
326.
  • Users blast government encr... Users blast government encryption plan. (National Security Agency's Clipper microchip and encryption key/escrow proposal)
    Anthes, Gary H Computerworld, 03/1994, Volume: 28, Issue: 12
    Magazine Article

    Information Systems Security Assn (ISSA) members officially contested US government data encryption policy proposals at ISSA's annual conference in Mar 1994. The new security and data access measures ...
Full text
327.
  • Building a Better Boot Camp Building a Better Boot Camp
    Ford, Richard; Frincke, Deborah A. IEEE security & privacy, 01/2010, Volume: 8, Issue: 1
    Magazine Article

    The field of security is vast, and the temptation is to keep adding to the collection of topics we consider to be basic. However, such an approach is inefficient. This installment focuses on Basic ...
Full text
328.
  • IS security exec tells of r... IS security exec tells of risks, strategies. (information systems executive Sally Meglathery)
    Eckerson, Wayne Network world, 09/1990, Volume: 7, Issue: 36
    Magazine Article

    Sally Meglathery, a data security executive and president of the Information Systems Security Association Inc, believes that it is possible for organizations to protect the security of their ...
Full text
329.
  • Informatique et cryptologie... Informatique et cryptologie : un déplacement des frontières
    Guillot, Philippe; Durand-Richard, Marie José Intellectica (Orsay, France : 1985), 2020
    Journal Article
    Open access

    Computer Science and Cryptology : a Border Shift. Turing's work shows the close links between cryptology and mechanization of computation. Their parallel evolution is still shifting many borders : ...
Full text
31 32 33
hits: 329

Load filters